The document gives a security overview of popular SSO protocols. The overview
is focusing on end-to-end security and non-repudiation of SSO parties communication.
It goes through popular SSO (and not only) protocols and briefly explains which
and how tokens used, how they signed and encrypted.